DB Recovery Systems Mcqs
Our collections of Multiple choice questions and answers focuses on study of ” DB Recovery Systems “. These questions are chosen from a collection of most authoritative and best reference books on DBMS. Our aim is to prepare an individual for competitive exams like NTS | GAT | ECAT | Data Warehouse jobs | Data Mining | DB administration jobs | Nadra Jobs | Software House and Data Base and Web Developer jobs | University and College entrance exams and various tests and job interviews. One should practice our Mcqs to assimilate knowledge on DB Recovery Systems comprehensively.
2. Checkpoints are a part of
Recovery measures
Security measures
Concurrency measures
Authorization measures
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
3. ……. deals with soft errors, such as power failures.
System recovery
Media recovery
Database recovery
Failure recovery
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
4. Rollback of transactions is normally used to :
Recover from transaction failure
Update the transaction
Retrieve old records
Repeat a transaction
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
5. A transaction performs on the isolation level of the Read Uncommitted if :
A dirty read occurs
Non-repeatable read occurs
Phantom reads occurs
All of the above
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
6. Which commands are used to control which users have which privilege over which objects ?
QUE and QUIST
GRANT and REVOKE
CASECADE and MVD
None of the above
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
7. When a deadlock is detected the recovery is normally accomplished by :
Rollback of transaction
Locking of data
Consistency checking
None of these
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
8. Which is not a desirable property of a transaction ?
Isolation
Atomicity
Durability
All are desirable
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
9. A directed graph which represents the deadlock is called :
Cycle graph
Deadlock graph
Wait-for graph
None of the above
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
10. Transaction Throughput is :
Elapsed Time between submitting a transaction and receiving a transaction.
Average no. of transaction processed per second.
No. of resources used by a transaction.
None of the above
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
11. Data encryption techniques are particularly useful for
Reducing storage space requirements
Improving data integrity
Protecting data in data communication systems
All of the above
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
12. Before any changes to database structure are attempted one should first:
Clearly understand the current structure and contents of the database only.
Test any changes on a test database only.
Create a complete backup of the operational database only.
All of the above should be done.
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
13. Which of the following modifications may not succeed?
Changing a column data type from char to date
Changing a column data type from numeric to char
Both of the above actions should succeed.
Neither of the above actions will succeed.
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
14. Because of the importance of making data model changes correctly, many professionals are ________ about using an automated process for database redesign.
Optimistic
Skeptical
Ambivalent
None of the above is correct.
Answer & Solution
No Solution for this Answer..! Report or Discus this Question
15. Which of the following can cause a transaction failure
Logical error
System error
More than one of the mentioned
None of the mentioned
Answer & Solution
No Solution for this Answer..! Report or Discus this Question